{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:06:25Z","timestamp":1769922385271,"version":"3.49.0"},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T00:00:00Z","timestamp":1765756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10207-025-01174-1","type":"journal-article","created":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T16:22:38Z","timestamp":1765815758000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A value-based approach for information classification"],"prefix":"10.1007","volume":"25","author":[{"given":"Luciano","family":"Ignaczak","sequence":"first","affiliation":[]},{"given":"M\u00e1rcio Garcia","family":"Martins","sequence":"additional","affiliation":[]},{"given":"Cristiano Andr\u00e9 da","family":"Costa","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Kunst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,15]]},"reference":[{"key":"1174_CR1","doi-asserted-by":"crossref","unstructured":"M\u00f6ller, D., M\u00f6ller, D.: Introduction to Cybersecurity. Cybersecurity In Digital Transformation: Scope And Applications. pp. 11-27 (2020)","DOI":"10.1007\/978-3-030-60570-4_2"},{"issue":"5","key":"1174_CR2","first-page":"744","volume":"69","author":"J Foster","year":"2018","unstructured":"Foster, J., Clough, P.: Embedded, added, cocreated: Revisiting the value of information in an age of data. J. Am. Soc. Inf. Sci. 69(5), 744\u2013748 (2018)","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"1174_CR3","unstructured":"Ponemon Institute LLC.: Global Encryption Trends Study: Find out how organizations are using encryption to protect data and workloads across multiple cloud platforms. (2022)"},{"key":"1174_CR4","unstructured":"Associa\u00e7\u00e3o Brasileira de Normas T\u00e9cnicas.: ABNT NBR 16167 - Seguran\u00e7a da Informa\u00e7\u00e3o - Diretrizes para classifica\u00e7\u00e3o, rotula\u00e7\u00e3o e tratamento da informa\u00e7\u00e3o. (2020)"},{"key":"1174_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1057\/s41303-016-0025-y","volume":"26","author":"E Niemimaa","year":"2017","unstructured":"Niemimaa, E., Niemimaa, M.: Information systems security policy implementation in practice: from best practices to situated practices. Eur. J. Inf. Syst. 26, 1\u201320 (2017)","journal-title":"Eur. J. Inf. Syst."},{"key":"1174_CR6","unstructured":"Bergstr\u00f6m, E., Anteryd, F., Ahlfeldt, R.: Information classification policies: an exploratory investigation. 17th Annual Security Conference, March 26-28, 2018 Las Vegas, NV, USA. (2018)"},{"key":"1174_CR7","unstructured":"Aksentijevi\u0107, S., Tijan, E., Agati\u0107, A.: Information security as utilization tool of enterprise information capital. 2011 Proceedings Of The 34th International Convention MIPRO. pp. 1391-1395 (2011)"},{"key":"1174_CR8","doi-asserted-by":"crossref","unstructured":"Andersson, S.: Problems in information classification: insights from practice. Information & Computer Security. (2023)","DOI":"10.1108\/ICS-10-2022-0163"},{"key":"1174_CR9","doi-asserted-by":"crossref","unstructured":"Singh, K., Rishiwal, V., Kumar, P.: Classification of Data to Enhance Data Security in Cloud Computing. 2018 3rd International Conference On Internet Of Things: Smart Innovation And Usages (IoT-SIU). pp. 1-5 (2018)","DOI":"10.1109\/IoT-SIU.2018.8519934"},{"key":"1174_CR10","doi-asserted-by":"crossref","unstructured":"Heintz, I., Grothendieck, J., Bernardin, F., Kuperman, G.: Improving Text Security Classification Towards an Automated Information Guard. MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM). pp. 757-762 (2022)","DOI":"10.1109\/MILCOM55135.2022.10017557"},{"key":"1174_CR11","doi-asserted-by":"crossref","unstructured":"Liang, Y., Wen, Z., Tao, Y., Li, G., Guo, B.: Automatic security classification based on incremental learning and similarity comparison. 2019 IEEE 8th Joint International Information Technology And Artificial Intelligence Conference (ITAIC). pp. 812-817 (2019)","DOI":"10.1109\/ITAIC.2019.8785798"},{"key":"1174_CR12","doi-asserted-by":"crossref","unstructured":"Chowdhary, K.: Natural Language Processing. Fundamentals Of Artificial Intelligence. pp. 603-649","DOI":"10.1007\/978-81-322-3972-7_19"},{"key":"1174_CR13","doi-asserted-by":"crossref","unstructured":"Alzhrani, K., Rudd, E., Chow, C., Boult, T.: Automated US diplomatic cables security classification: Topic model pruning vs. classification based on clusters. 2017 IEEE International Symposium On Technologies For Homeland Security (HST). pp. 1-6 (2017)","DOI":"10.1109\/THS.2017.7943471"},{"key":"1174_CR14","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.engappai.2018.07.010","volume":"75","author":"J Huang","year":"2018","unstructured":"Huang, J., Chiang, C., Chang, J.: Email security level classification of imbalanced data using artificial neural network: the real case in a world-leading enterprise. Eng. Appl. Artif. Intell. 75, 11\u201321 (2018)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"1174_CR15","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1007\/s10115-021-01592-2","volume":"63","author":"R Geetha","year":"2021","unstructured":"Geetha, R., Karthika, S., Kumaraguru, P.: Tweet-scan-post: a system for analysis of sensitive private data disclosure in online social media. Knowledge And Information Systems. 63, 2365\u20132404 (2021)","journal-title":"Knowledge And Information Systems."},{"key":"1174_CR16","doi-asserted-by":"crossref","unstructured":"Dogra, V., Verma, S., Kavita, Chatterjee, P., Shafi, J., Choi, J., Ijaz, M.: A Complete Process of Text Classification System Using State-of-the-Art NLP Models. Computational Intelligence And Neuroscience. (2022)","DOI":"10.1155\/2022\/1883698"},{"key":"1174_CR17","doi-asserted-by":"crossref","unstructured":"Doherty, N., Tajuddin, S.: Towards a user-centric theory of value-driven information security compliance. Information Technology & People. (2018)","DOI":"10.1108\/ITP-08-2016-0194"},{"key":"1174_CR18","doi-asserted-by":"crossref","unstructured":"Ibnugraha, P., Nugroho, L., Santosa, P.: Risk model development for information security in organization environment based on business perspectives. International Journal Of Information Security. pp. 1-14 (2020)","DOI":"10.1007\/s10207-020-00495-7"},{"key":"1174_CR19","doi-asserted-by":"crossref","unstructured":"Guttman, B., Roback, E.: SP 800-12. An Introduction to Computer Security: the NIST handbook. (1995)","DOI":"10.6028\/NIST.SP.800-12"},{"key":"1174_CR20","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.cose.2013.04.004","volume":"38","author":"R Von Solms","year":"2013","unstructured":"Von Solms, R., Van Niekerk, J.: From information security to cyber security. Computers & Security. 38, 97\u2013102 (2013)","journal-title":"Computers & Security."},{"key":"1174_CR21","unstructured":"International Organization for Standardization. ISO 27000 - Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Overview and vocabulary. (2018)"},{"key":"1174_CR22","doi-asserted-by":"crossref","unstructured":"Newhouse, W., Souppaya, M., Kent, J., Sandlin, K., Scarfone, K.: Data Classification Concepts and Considerations for Improving Data Collection. (2023)","DOI":"10.6028\/NIST.IR.8496.ipd"},{"key":"1174_CR23","unstructured":"International Organization for Standardization. ISO 27002 - Information security, cybersecurity and privacy protection \u2013 Information security controls. (2022)"},{"key":"1174_CR24","unstructured":"Organization of American States. Data Classification. (2019), last time accessed: 2024-10-21. [Online]. Available: https:\/\/www.oas.org\/en\/sms\/cicte\/docs\/ENG-Data-Classidication.pdf"},{"key":"1174_CR25","doi-asserted-by":"crossref","unstructured":"Bergstrom, E., Ahlfeldt, R.: Information classification issues. Nordic Conference On Secure IT Systems. pp. 27-41 (2014)","DOI":"10.1007\/978-3-319-11599-3_2"},{"key":"1174_CR26","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1147\/JRD.2009.5429044","volume":"53","author":"S Hennessy","year":"2009","unstructured":"Hennessy, S., Lauer, G., Zunic, N., Gerber, B., Nelson, A.: Data-centric security: Integrating data privacy and data security. IBM J. Res. Dev. 53, 2\u20131 (2009)","journal-title":"IBM J. Res. Dev."},{"key":"1174_CR27","doi-asserted-by":"crossref","unstructured":"Mathkour, H., Touir, A., Al-Sanie, W.: Automatic information classifier using rhetorical structure theory. Intelligent Information Processing And Web Mining. pp. 229-236 (2005)","DOI":"10.1007\/3-540-32392-9_24"},{"key":"1174_CR28","unstructured":"Brown, J., Charlebois, D.: Security classification using automated learning (scale): optimizing statistical natural language processing techniques to assign security labels to unstructured text. (2010)"},{"key":"1174_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3462477","volume":"54","author":"L Ignaczak","year":"2021","unstructured":"Ignaczak, L., Goldschmidt, G., Costa, C., Righi, R.: Text mining in cybersecurity: A systematic literature review. ACM Comput. Surv. (CSUR). 54, 1\u201336 (2021)","journal-title":"ACM Comput. Surv. (CSUR)."},{"key":"1174_CR30","doi-asserted-by":"crossref","unstructured":"Kitchenham, B., Budgen, D., Brereton, P.: Evidence-based software engineering and systematic reviews. CRC press (2015)","DOI":"10.1201\/b19467"},{"key":"1174_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103240","volume":"60","author":"M Yang","year":"2023","unstructured":"Yang, M., Tan, L., Chen, X., Luo, Y., Xu, Z., Lan, X.: Laws and regulations tell how to classify your data: A case study on higher education. Inf. Process. Manag. 60, 103240 (2023)","journal-title":"Inf. Process. Manag."},{"key":"1174_CR32","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1007\/s10586-016-0539-z","volume":"19","author":"M Zardari","year":"2016","unstructured":"Zardari, M., Jung, L.: Data security rules\/regulations based classification of file data using TsF-kNN algorithm. Clust. Comput. 19, 349\u2013368 (2016)","journal-title":"Clust. Comput."},{"key":"1174_CR33","doi-asserted-by":"crossref","unstructured":"Alzhrani, K., Rudd, E., Chow, C., Boult, T.: Automated big security text pruning and classification. 2016 IEEE International Conference On Big Data (Big Data). pp. 3629-3637 (2016)","DOI":"10.1109\/BigData.2016.7841028"},{"key":"1174_CR34","doi-asserted-by":"crossref","unstructured":"Alzhrani, K., Rudd, E., Boult, T., Chow, C.: Automated big text security classification. 2016 IEEE Conference On Intelligence And Security Informatics (ISI). pp. 103-108 (2016)","DOI":"10.1109\/ISI.2016.7745451"},{"key":"1174_CR35","doi-asserted-by":"crossref","unstructured":"Engelstad, P., Hammer, H., Yazidi, A., Bai, A.: Advanced classification lists (dirty word lists) for automatic security classification. 2015 International Conference On Cyber-Enabled Distributed Computing And Knowledge Discovery. pp. 44-53 (2015)","DOI":"10.1109\/CyberC.2015.103"},{"key":"1174_CR36","doi-asserted-by":"crossref","unstructured":"Hammer, H., Kongsgard, K., Bai, A., Yazidi, A., Nordbotten, N., Engelstad, P.: Automatic security classification by machine learning for cross-domain information exchange. MILCOM 2015-2015 IEEE Military Communications Conference. pp. 1590-1595 (2015)","DOI":"10.1109\/MILCOM.2015.7357672"},{"key":"1174_CR37","doi-asserted-by":"crossref","unstructured":"Engelstad, P., Hammer, H., Yazidi, A., Bai, A.: Analysis of time-dependencies in automatic security classification. 2015 International Conference On Cyber-Enabled Distributed Computing And Knowledge Discovery. pp. 54-61 (2015)","DOI":"10.1109\/CyberC.2015.104"},{"key":"1174_CR38","doi-asserted-by":"crossref","unstructured":"Yazidi, A., Hammer, H., Bai, A., Engelstad, P.: On the feasibility of machine learning as a tool for automatic security classification: A position paper. 2016 International Conference On Computing, Networking And Communications (ICNC). pp. 1-6 (2016)","DOI":"10.1109\/ICCNC.2016.7440588"},{"key":"1174_CR39","unstructured":"Department of Homeland Security. Handbook for Safeguarding Sensitive PII. (2017)"},{"key":"1174_CR40","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1057\/s41288-020-00185-4","volume":"45","author":"O Poyraz","year":"2020","unstructured":"Poyraz, O., Canan, M., McShane, M., Pinto, C., Cotter, T.: Cyber assets at risk: monetary impact of US personally identifiable information mega data breaches. Geneva Pap. Risk Insur.: Issues Pract. 45, 616\u2013638 (2020)","journal-title":"Geneva Pap. Risk Insur.: Issues Pract."},{"key":"1174_CR41","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1075\/li.30.1.03nad","volume":"30","author":"D Nadeau","year":"2007","unstructured":"Nadeau, D., Sekine, S.: A survey of named entity recognition and classification. Lingv. Investig. 30, 3\u201326 (2007)","journal-title":"Lingv. Investig."},{"key":"1174_CR42","doi-asserted-by":"crossref","unstructured":"Aggarwal, C., Zhai, C.: Mining text data. Springer Science & Business Media (2012)","DOI":"10.1007\/978-1-4614-3223-4"},{"key":"1174_CR43","doi-asserted-by":"crossref","unstructured":"Yan, Y., Sun, H., Liu, J.: A review and outlook for relation extraction. Proceedings Of The 5th International Conference On Computer Science And Application Engineering. pp. 1-5 (2021)","DOI":"10.1145\/3487075.3487103"},{"key":"1174_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3507900","volume":"54","author":"R Churchill","year":"2022","unstructured":"Churchill, R., Singh, L.: The evolution of topic modeling. ACM Comput. Surv. 54, 1\u201335 (2022)","journal-title":"ACM Comput. Surv."},{"key":"1174_CR45","doi-asserted-by":"crossref","unstructured":"Arkes, J.: Regression Analysis: A Practical Introduction. Taylor & Francis (2023)","DOI":"10.4324\/9781003285007"},{"key":"1174_CR46","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1002\/wics.1346","volume":"7","author":"U Gr\u00f6mping","year":"2015","unstructured":"Gr\u00f6mping, U.: Variable importance in regression models. Wiley Interdiscip. Rev. Comput. Stat. 7, 137\u2013152 (2015)","journal-title":"Wiley Interdiscip. Rev. Comput. Stat."},{"key":"1174_CR47","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.neunet.2018.12.010","volume":"111","author":"M Fern\u00e1ndez-Delgado","year":"2019","unstructured":"Fern\u00e1ndez-Delgado, M., Sirsat, M., Cernadas, E., Alawadi, S., Barro, S., Febrero-Bande, M.: An extensive experimental survey of regression methods. Neural Netw. 111, 11\u201334 (2019)","journal-title":"Neural Netw."},{"key":"1174_CR48","doi-asserted-by":"crossref","unstructured":"Smith, R.: An overview of the Tesseract OCR engine. Ninth International Conference On Document Analysis And Recognition (ICDAR 2007). 2 pp. 629-633 (2007)","DOI":"10.1109\/ICDAR.2007.4376991"},{"key":"1174_CR49","doi-asserted-by":"crossref","unstructured":"Fleckenstein, M., Obaidi, A., Tryfona, N.: A Review of Data Valuation Approaches and Building and Scoring a Data Valuation Model. Harvard Data Science Review. 5 (2023), last time accessed: 2024-10-21. [Online]. Available: https:\/\/hdsr.mitpress.mit.edu\/pub\/1qxkrnig","DOI":"10.1162\/99608f92.c18db966"},{"key":"1174_CR50","unstructured":"IBM Security. Cost of a Data Breach Report 2023. (2023)"},{"key":"1174_CR51","unstructured":"Dasgupta, R., Ganesan, B., Kannan, A., Reinwald, B., Kumar, A.: Fine grained classification of personal data entities. ArXiv Preprint ArXiv:1811.09368. (2018)"},{"key":"1174_CR52","first-page":"263","volume":"30","author":"M Sajko","year":"2006","unstructured":"Sajko, M., Rabuzin, K., Ba\u010da, M.: How to calculate information value for effective security risk assessment. J. inf. organ. sci. 30, 263\u2013278 (2006)","journal-title":"J. inf. organ. sci."},{"key":"1174_CR53","volume-title":"Handbook of inter-rater reliability: The definitive guide to measuring the extent of agreement among raters","author":"K Gwet","year":"2014","unstructured":"Gwet, K.: Handbook of inter-rater reliability: The definitive guide to measuring the extent of agreement among raters. Advanced Analytics, LLC (2014)"},{"key":"1174_CR54","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"M McHugh","year":"2012","unstructured":"McHugh, M.: Interrater reliability: the kappa statistic. Biochemia Medica. 22, 276\u2013282 (2012)","journal-title":"Biochemia Medica."},{"key":"1174_CR55","doi-asserted-by":"crossref","unstructured":"Landis, J., Koch, G.: The measurement of observer agreement for categorical data. Biometrics. pp. 159-174 (1977)","DOI":"10.2307\/2529310"},{"key":"1174_CR56","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s44248-023-00005-9","volume":"1","author":"L Ignaczak","year":"2023","unstructured":"Ignaczak, L., Martins, M., Costa, C., Donida, B., Silva, M.: An evaluation of NERC learning-based approaches to discover personal data in Brazilian Portuguese documents. Discover Data. 1, 5 (2023)","journal-title":"Discover Data."},{"key":"1174_CR57","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1287\/deca.2020.0418","volume":"17","author":"A Couce-Vieira","year":"2020","unstructured":"Couce-Vieira, A., Insua, D., Kosgodagan, A.: Assessing and forecasting cybersecurity impacts. Decis. Anal. 17, 356\u2013374 (2020)","journal-title":"Decis. Anal."},{"key":"1174_CR58","doi-asserted-by":"crossref","unstructured":"Zheng, M., Jiang, K., Xu, R., Qi, L.: An Adaptive LDA Optimal Topic Number Selection Method in News Topic Identification. IEEE Access. (2023)","DOI":"10.1109\/ACCESS.2023.3308520"},{"key":"1174_CR59","doi-asserted-by":"crossref","unstructured":"Loper, E., Bird, S.: Nltk: The natural language toolkit. ArXiv Preprint Cs\/0205028. (2002)","DOI":"10.3115\/1118108.1118117"},{"key":"1174_CR60","unstructured":"Honnibal, M., Montani, I.: spaCy 2: Natural language understanding with Bloom embeddings, convolutional neural networks and incremental parsing. (2017)"},{"key":"1174_CR61","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V.: Others Scikit-learn. Machine learning in Python: The Journal Of Machine Learning Research. 12, 2825\u20132830 (2011)","journal-title":"Machine learning in Python: The Journal Of Machine Learning Research."},{"key":"1174_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1471-2105-16-S13-S8","volume":"16","author":"W Zhao","year":"2015","unstructured":"Zhao, W., Chen, J., Perkins, R., Liu, Z., Ge, W., Ding, Y., Zou, W.: A heuristic approach to determine an appropriate number of topics in topic modeling. BMC Bioinformatics 16, 1\u201310 (2015)","journal-title":"BMC Bioinformatics"},{"key":"1174_CR63","doi-asserted-by":"crossref","unstructured":"Abdelrazek, A., Eid, Y., Gawish, E., Medhat, W., Hassan, A.: Topic modeling algorithms and applications: A survey. Information Systems. pp. 102131 (2022)","DOI":"10.1016\/j.is.2022.102131"},{"key":"1174_CR64","doi-asserted-by":"crossref","unstructured":"Feng, S., Gangal, V., Wei, J., Chandar, S., Vosoughi, S., Mitamura, T., Hovy, E.: A survey of data augmentation approaches for NLP. ArXiv Preprint ArXiv:2105.03075. (2021)","DOI":"10.18653\/v1\/2021.findings-acl.84"},{"key":"1174_CR65","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.ins.2019.07.070","volume":"505","author":"D Elreedy","year":"2019","unstructured":"Elreedy, D., Atiya, A.: A comprehensive analysis of synthetic minority oversampling technique (SMOTE) for handling class imbalance. Inf. Sci. 505, 32\u201364 (2019)","journal-title":"Inf. Sci."},{"key":"1174_CR66","first-page":"1","volume":"18","author":"G Lema\u00e3\u017dtre","year":"2017","unstructured":"Lema\u00e3\u017dtre, G., Nogueira, F., Aridas, C.: Imbalanced-learn: A python toolbox to tackle the curse of imbalanced datasets in machine learning. J. Mach. Learn. Res. 18, 1\u20135 (2017)","journal-title":"J. Mach. Learn. Res."},{"key":"1174_CR67","doi-asserted-by":"crossref","unstructured":"Souza, F., Nogueira, R., Lotufo, R.: BERTimbau: pretrained BERT models for Brazilian Portuguese. Intelligent Systems: 9th Brazilian Conference, BRACIS 2020, Rio Grande, Brazil, October 20\u201323, 2020, Proceedings, Part I 9. pp. 403-417 (2020)","DOI":"10.1007\/978-3-030-61377-8_28"},{"key":"1174_CR68","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1111\/cgf.13181","volume":"36","author":"M El-Assady","year":"2017","unstructured":"El-Assady, M., Sevastjanova, R., Gipp, B., Keim, D., Collins, C.: NEREx: Named-Entity Relationship Exploration in Multi-Party Conversations. Comput. Graph. Forum 36, 213\u2013225 (2017)","journal-title":"Comput. Graph. Forum"},{"key":"1174_CR69","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","volume":"45","author":"M Sokolova","year":"2009","unstructured":"Sokolova, M., Lapalme, G.: A systematic analysis of performance measures for classification tasks. Inf. Process. Manag. 45, 427\u2013437 (2009)","journal-title":"Inf. Process. Manag."},{"key":"1174_CR70","doi-asserted-by":"crossref","unstructured":"Nicolls, W.: Implementing Company Classification Policy with the S\/MIME Security Label. (2002)","DOI":"10.17487\/rfc3114"},{"key":"1174_CR71","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2021.101962","volume":"138","author":"N Othman","year":"2022","unstructured":"Othman, N., Faiz, R., Smaili, K.: Learning English and Arabic question similarity with Siamese neural networks in community question answering services. Data Knowl. Eng. 138, 101962 (2022)","journal-title":"Data Knowl. Eng."},{"key":"1174_CR72","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1016\/j.chb.2013.07.043","volume":"30","author":"F Colace","year":"2014","unstructured":"Colace, F., De Santo, M., Greco, L., Napoletano, P.: Text classification using a few labeled examples. Comput. Hum. Behav. 30, 689\u2013697 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"1174_CR73","doi-asserted-by":"crossref","unstructured":"Lor\u00e8, F., Basile, P., Appice, A., Gemmis, M., Malerba, D., Semeraro, G.: An AI framework to support decisions on GDPR compliance. Journal Of Intelligent Information Systems. pp. 1-28 (2023)","DOI":"10.1007\/s10844-023-00782-4"},{"key":"1174_CR74","first-page":"31","volume":"7","author":"T Peltier","year":"1998","unstructured":"Peltier, T.: Information classification. Inf. Syst. Secur. 7, 31\u201343 (1998)","journal-title":"Inf. Syst. Secur."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01174-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01174-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01174-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T16:08:13Z","timestamp":1769875693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01174-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,15]]},"references-count":74,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["1174"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01174-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,15]]},"assertion":[{"value":"28 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"This study was approved by the Unisinos University Research Ethics Committee, Reference number CAAE52948621.8.1001.5344.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"9"}}